Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
ee8d4eb3df2ba9ddf10cd61a6aabeebb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8d4eb3df2ba9ddf10cd61a6aabeebb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee8d4eb3df2ba9ddf10cd61a6aabeebb_JaffaCakes118.html
-
Size
56KB
-
MD5
ee8d4eb3df2ba9ddf10cd61a6aabeebb
-
SHA1
40df2d3f952b36843bfe995c2211e0f4f742d247
-
SHA256
6479fd5a15967238025b55887d1adccbb392b8cd4353c91e948b6e2640f20192
-
SHA512
9bf95334d747fc52600cd051cc6d1f5b340835ff8eea89d162f3c1fe45e68a2e755adcf1f6d7bbc5d643fd8e102e2ecec6984623ded8e294006e59d4208d6129
-
SSDEEP
768:Dr+F3Q3/aW3Y0T3C3w7S6MuRGbCQ+PA2bzoJ3HIJBnaodhUf8H5ewSRtg460LAAL:uF3Q3/ad+CGl8aBDSlT2IhsZQMI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 1780 msedge.exe 1780 msedge.exe 672 identity_helper.exe 672 identity_helper.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1732 1780 msedge.exe 82 PID 1780 wrote to memory of 1732 1780 msedge.exe 82 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 2352 1780 msedge.exe 83 PID 1780 wrote to memory of 4700 1780 msedge.exe 84 PID 1780 wrote to memory of 4700 1780 msedge.exe 84 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85 PID 1780 wrote to memory of 4224 1780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ee8d4eb3df2ba9ddf10cd61a6aabeebb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff540d46f8,0x7fff540d4708,0x7fff540d47182⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15896662189621908848,3999518076615288547,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
473B
MD56a618266d0ea4430ea3158ffd418dd0c
SHA114552018a21ab3929553af10142e22c6d63cded2
SHA25689015f492ee2e35825afc462240004265397ecd5849cd14e71e98ea26fc33739
SHA5123e440909cf919a9858410d7660857f3566f5b7439f95185c4130471796c1872ad4aeb4f05147a3e7afe465a9e7c3e00982ab091b4cbdcf3b0c27e0baf954061e
-
Filesize
442B
MD5f280847463fdaf57798ec0d3ded33e2b
SHA13a702281a871c61b2fc95a26b7d3effbb8f7ced1
SHA256f155b5525357c9029b457680e5a7e172d2633ebb3fc899934e242eb46befc9de
SHA5124a75f7f3c9c55d1f3313f5ee0a1148c09e27019bdb2f1d7d7eb210c708e565b68428211a04a44f9554fde2d3ed17fbc8c2b940bea0dd44b63903dcd24ba4cb7b
-
Filesize
5KB
MD5b539673845dd8dd53277667f07fb167d
SHA1746087e6412b3f10d99064856e9e944a3ab1151e
SHA256ba362958422769affbe4f5274c203a576b79dfa5d0d55f6855e469669ae6d06b
SHA512e0773d22e03470513cee98250bacff4f00ef93dfa5fb7c5c50e197c7f77c2b1daaa59f810a8b3ad0c0d998832057c101c9f81c07a3d6db0330b7a7a095d8afab
-
Filesize
6KB
MD59f5b7c6261a66d7aaff23ef3c89e1191
SHA1ea1b9599b3aa8cd993c92e23b74f6b06d179bf7a
SHA25692884520d620f64e468c30dc3572b0360f88bd12666d2f8116c688dba7d2a71f
SHA512f1e975f1a93e2cd02e90761d140e9a258bbfd0919bfd952786a221275e18dec4e2997e335bcb8a842060a48f64f60de378fadaa8761ef363eee9a9bfd65e1f69
-
Filesize
6KB
MD5079f6a9261642ad6472a416b6693ecb3
SHA184b5010db9aeb5ea7db893868165d6a2060669e7
SHA25605b47dc7c31084884fa34471613b2a014e8d551b56c95055bb696b274784f246
SHA512232b7fa78c5b4563619513abd56175667602f1087e25f93ee10183a2e64991cbecead63134344b50eefd047df2835a93caa69795167c382100b483680a7fd36d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f8693508391f81888e0c6f40e7dfed05
SHA19431d1554c3be1b51622df4b8bf9e73170cba426
SHA256125d04e389182b1a277852d8029678370b8444d9287c79b488c0daa2d96561e2
SHA5127a7d0ebe2bebd779c382fa148681311f12787ab1077cd9d898e1778facdaa6d9351036ad66cdb1274f6d169abe258d6e3affeacd2fa62929b3d9bedad6741207